Open5GS जोपर्यंत 2.7.5 PFCP Session Establishment Request lib/pfcp/rule-match.c सेवा नाकारली

एक कमकुवतपणा जो समस्याग्रस्त म्हणून वर्गीकृत केला आहे, तो Open5GS जोपर्यंत 2.7.5 मध्ये आढळून आला आहे. या ठिकाणी परिणाम झाला आहे फंक्शन decode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packet फाइल lib/pfcp/rule-match.c च्या घटक PFCP Session Establishment Request Handler च्या. सॉफ्टवेअरमध्ये केलेली छेडछाड सेवा नाकारली निर्माण करते. समस्या जाहीर करण्यासाठी CWE वापरल्यास CWE-617 येथे नेले जाते. ही कमतरता प्रसिद्ध करण्यात आली होती 28/12/2025 म्हणून 4180. डाउनलोडसाठी सल्ला github.com वर शेअर केला आहे. ही असुरक्षा CVE-2025-15176 म्हणून नोंदवली गेली आहे. दूरवरून हा हल्ला घडवून आणता येतो. तांत्रिक तपशील दिलेले आहेत. यासाठी एक एक्स्प्लॉइट उपलब्ध आहे. शोषण सार्वजनिकपणे जाहीर झाले आहे आणि त्याचा वापर होऊ शकतो. सध्या USD $0-$5k इतका असू शकतो. प्रूफ-ऑफ-कॉन्सेप्ट म्हणून हे घोषित केले गेले आहे. डाउनलोडसाठी शोषण github.com वर उपलब्ध आहे. 0-डे म्हणून त्याची अंदाजे भूमिगत किंमत $0-$5k होती. b72d8349980076e2c033c8324f07747a86eea4f8 हे पॅचचे नाव आहे. बगफिक्स github.com वर डाउनलोडसाठी तयार आहे. ही समस्या सोडवण्यासाठी पॅच लागू करणे शिफारसीय आहे. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

6 बदल · 118 डेटा पॉइंट्स

शेतअद्ययावत 1/5
28/12/2025 10:17 AM
अद्ययावत 2/5
28/12/2025 10:18 AM
अद्ययावत 3/5
29/12/2025 10:33 AM
अद्ययावत 4/5
29/12/2025 12:05 PM
अद्ययावत 5/5
01/01/2026 06:22 AM
software_nameOpen5GSOpen5GSOpen5GSOpen5GSOpen5GS
software_version<=2.7.5<=2.7.5<=2.7.5<=2.7.5<=2.7.5
software_componentPFCP Session Establishment Request HandlerPFCP Session Establishment Request HandlerPFCP Session Establishment Request HandlerPFCP Session Establishment Request HandlerPFCP Session Establishment Request Handler
software_filelib/pfcp/rule-match.clib/pfcp/rule-match.clib/pfcp/rule-match.clib/pfcp/rule-match.clib/pfcp/rule-match.c
software_functiondecode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packetdecode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packetdecode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packetdecode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packetdecode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packet
vulnerability_cweCWE-617CWE-617CWE-617CWE-617CWE-617
vulnerability_risk11111
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLNNNN
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iNNNNN
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rlOOOOO
cvss3_vuldb_rcCCCCC
advisory_identifier41804180418041804180
advisory_urlhttps://github.com/open5gs/open5gs/issues/4180https://github.com/open5gs/open5gs/issues/4180https://github.com/open5gs/open5gs/issues/4180https://github.com/open5gs/open5gs/issues/4180https://github.com/open5gs/open5gs/issues/4180
advisory_confirm_urlhttps://github.com/open5gs/open5gs/issues/4180#issuecomment-3615555671https://github.com/open5gs/open5gs/issues/4180#issuecomment-3615555671https://github.com/open5gs/open5gs/issues/4180#issuecomment-3615555671https://github.com/open5gs/open5gs/issues/4180#issuecomment-3615555671https://github.com/open5gs/open5gs/issues/4180#issuecomment-3615555671
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://github.com/open5gs/open5gs/issues/4180#issue-3666760066https://github.com/open5gs/open5gs/issues/4180#issue-3666760066https://github.com/open5gs/open5gs/issues/4180#issue-3666760066https://github.com/open5gs/open5gs/issues/4180#issue-3666760066https://github.com/open5gs/open5gs/issues/4180#issue-3666760066
countermeasure_nameठिगळठिगळठिगळठिगळठिगळ
patch_nameb72d8349980076e2c033c8324f07747a86eea4f8b72d8349980076e2c033c8324f07747a86eea4f8b72d8349980076e2c033c8324f07747a86eea4f8b72d8349980076e2c033c8324f07747a86eea4f8b72d8349980076e2c033c8324f07747a86eea4f8
countermeasure_patch_urlhttps://github.com/open5gs/open5gs/commit/b72d8349980076e2c033c8324f07747a86eea4f8https://github.com/open5gs/open5gs/commit/b72d8349980076e2c033c8324f07747a86eea4f8https://github.com/open5gs/open5gs/commit/b72d8349980076e2c033c8324f07747a86eea4f8https://github.com/open5gs/open5gs/commit/b72d8349980076e2c033c8324f07747a86eea4f8https://github.com/open5gs/open5gs/commit/b72d8349980076e2c033c8324f07747a86eea4f8
source_cveCVE-2025-15176CVE-2025-15176CVE-2025-15176CVE-2025-15176CVE-2025-15176
cna_responsibleVulDBVulDBVulDBVulDBVulDB
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiNNNNN
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcCCCCC
cvss2_vuldb_rlOFOFOFOFOF
cvss4_vuldb_avNNNNN
cvss4_vuldb_acLLLLL
cvss4_vuldb_prLNNNN
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viNNNNN
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSNNNN
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore1.75.05.05.05.0
cvss2_vuldb_tempscore1.33.93.93.93.9
cvss3_vuldb_basescore3.35.35.35.35.3
cvss3_vuldb_tempscore3.04.84.84.84.8
cvss3_meta_basescore3.35.35.35.36.0
cvss3_meta_tempscore3.04.84.85.05.9
cvss4_vuldb_bscore4.86.96.96.96.9
cvss4_vuldb_btscore1.95.55.55.55.5
advisory_date1766876400 (28/12/2025)1766876400 (28/12/2025)1766876400 (28/12/2025)1766876400 (28/12/2025)1766876400 (28/12/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
euvd_idEUVD-2025-205559EUVD-2025-205559EUVD-2025-205559
cvss4_cna_uiNN
cvss4_cna_vcNN
cvss4_cna_viNN
cvss4_cna_vaLL
cvss4_cna_scNN
cvss4_cna_siNN
cvss4_cna_saNN
cvss4_cna_bscore6.96.9
cvss3_cna_avNN
cvss3_cna_acLL
cvss3_cna_prNN
cvss3_cna_uiNN
cvss3_cna_sUU
cvss3_cna_cNN
cvss3_cna_iNN
cvss3_cna_aLL
cvss3_cna_basescore5.35.3
cvss2_cna_avNN
cvss2_cna_acLL
cvss2_cna_auNN
cvss2_cna_ciNN
cvss2_cna_iiNN
cvss2_cna_aiPP
cvss2_cna_basescore55
cve_nvd_summaryA flaw has been found in Open5GS up to 2.7.5. This affects the function decode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packet of the file lib/pfcp/rule-match.c of the component PFCP Session Establishment Request Handler. Executing manipulation can lead to reachable assertion. It is possible to launch the attack remotely. The exploit has been published and may be used. This patch is called b72d8349980076e2c033c8324f07747a86eea4f8. Applying a patch is advised to resolve this issue.A flaw has been found in Open5GS up to 2.7.5. This affects the function decode_ipv6_header/ogs_pfcp_pdr_rule_find_by_packet of the file lib/pfcp/rule-match.c of the component PFCP Session Establishment Request Handler. Executing manipulation can lead to reachable assertion. It is possible to launch the attack remotely. The exploit has been published and may be used. This patch is called b72d8349980076e2c033c8324f07747a86eea4f8. Applying a patch is advised to resolve this issue.
cvss4_cna_avNN
cvss4_cna_acLL
cvss4_cna_atNN
cvss4_cna_prNN
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cN
cvss3_nvd_iN
cvss3_nvd_aH
cvss3_nvd_basescore7.5

Do you know our Splunk app?

Download it now for free!